messageformat prototype pollution vulnerability
High severity
GitHub Reviewed
Published
Sep 24, 2025
to the GitHub Advisory Database
•
Updated Sep 24, 2025
Description
Published by the National Vulnerability Database
Sep 24, 2025
Published to the GitHub Advisory Database
Sep 24, 2025
Reviewed
Sep 24, 2025
Last updated
Sep 24, 2025
The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version.
References